Resource Type

Journal Article 811

Year

2024 1

2023 50

2022 81

2021 53

2020 54

2019 51

2018 42

2017 58

2016 30

2015 36

2014 35

2013 30

2012 29

2011 27

2010 24

2009 35

2008 35

2007 49

2006 23

2005 16

open ︾

Keywords

control 40

vector control 8

maximum power point tracking (MPPT) 7

quality control 7

robust control 7

COVID-19 6

Multi-agent systems 6

neural network 6

simulation 6

temperature control 6

robustness 5

vibration control 5

Adaptive control 4

MR damper 4

Optimal control 4

adaptive control 4

control strategy 4

development 4

sliding mode control 4

open ︾

Search scope:

排序: Display mode:

Aslotted floor acquisitionmultiple access based MACprotocol for underwater acoustic networks withRTS

Liang-fang QIAN,Sen-lin ZHANG,Mei-qin LIU

Frontiers of Information Technology & Electronic Engineering 2015, Volume 16, Issue 3,   Pages 217-226 doi: 10.1631/FITEE.1400187

Abstract: Long propagation delay, limited bandwidth, and high bit error rate pose great challenges in media accesscontrol (MAC) protocol design for underwater acoustic networks.A MAC protocol called slotted floor acquisition multiple access (slotted-FAMA) suitable for underwater

Keywords: Underwater acoustic networks     Medium access control (MAC)     Request-to-send (RTS) competition     Throughput    

Double access control model of web service based ondistributed simulation system

Chen Xueqin,Wu Huizhong,Zhu Yaoqin

Strategic Study of CAE 2009, Volume 11, Issue 8,   Pages 72-78

Abstract: many simulation resources to the wide area network, which are difficult for traditional and single accesscontrol models to deal with.A double access control based on attributes is proposed to achieve the access control of applicationThe process flow of the access control is described in detail.The performance of resource access control realized on XACML is analyzed and tested, which proves the

Keywords: Web service security     double access control     distributed simulation system    

Node Status Monitoring of Information-Centric Internet of Things

Cui Liqun, Wu Jun

Strategic Study of CAE 2020, Volume 22, Issue 6,   Pages 121-127 doi: 10.15302/J-SSCAE-2020.06.016

Abstract: designs a security protection mechanism to achieve the purpose of ensuring data confidentiality and accesscontrol for management users.delay brought by the above-mentioned trace routing mechanism, adaptive data placement strategy, and accesscontrol security protection is evaluated.The access control model provides data confidentiality and other security functions for the solution,

Keywords: information-centric networking,Internet of Things,node status monitoring,access control    

Easy access to pharmaceutically relevant heterocycles by catalytic reactions involving

Ximei Zhao, Matthias Rudolph, Abdullah M. Asiri, A. Stephen K. Hashmi

Frontiers of Chemical Science and Engineering 2020, Volume 14, Issue 3,   Pages 317-349 doi: 10.1007/s11705-019-1874-4

Abstract: This review summarizes recent advances in the field of gold-catalyzed synthesis of pharmaceutically relevant aza-heterocycles via generated -imino gold carbene complexes as intermediates.

Keywords: gold     heterocycles     alkynes    

Multiple-antenna techniques in nonorthogonalmultiple access: a review Regular Papers

Fei-yan TIAN, Xiao-ming CHEN

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 12,   Pages 1665-1697 doi: 10.1631/FITEE.1900405

Abstract: As a promising physical layer technique, nonorthogonal multiple access (NOMA) can admit multiple userssame space-time resource block, and thus improve the spectral efficiency and increase the number of access

Keywords: Nonorthogonal multiple access     Multiple-antenna technique     B5G     Internet of Things    

ionic liquids based on DABCO-derived quaternary ammonium salts: A promising reaction medium in gaining access

Muhammad Faisal, Azeem Haider, Quret ul Aein, Aamer Saeed, Fayaz Ali Larik

Frontiers of Chemical Science and Engineering 2019, Volume 13, Issue 3,   Pages 586-598 doi: 10.1007/s11705-018-1788-6

Abstract: Owing to the directional H-bonding, coordination and -stacking abilities, terpyridines have been widely used as supramolecular tectons in molecular architectures, skeletons in molecular devices and metallopolymers, and are gaining importance in medicinal chemistry. In this paper, we have synthesized, characterized and applied deep eutectic ionic liquids (DEILs) based on 1,4-diazabicyclo[2.2.2]octane; triethylenediamine (DABCO)-derived quaternary ammonium salts for the preparation of terpyridines. These DEILs were synthesized through -alkylation of DABCO with haloalkanes (1-bromopentane or 1-bromoheptane) followed by mixing and heating with methanol or polyethylene glycol as a hydrogen bond donor. The synthesized DEILs were structurally characterized by IR and NMR. The formation of deep eutectic solvent was confirmed by freezing point depression, it composition was investigated through phase diagram, and its thermal stability was determined through differential scanning calorimetry, derivative thermogravimetry and thermal gravimetric analysis studies. Further, theseDEILswereinvestigatedfor theireffectivenesstowards synthesis of 2,2′:6′,2″-terpyridine, 3,2′:6′,3″-terpyridineand 4,2′:6′,4″-terpyridinederivatives through Kröhnke reaction. The results show that these three types of terpyridines can be obtained in reasonable yields (80% 97%) by the one-pot reaction of 2-, 3- or 4-acetylpyridine with a variety of aromatic aldehydes in the presence of DEIL as a reaction medium, sodium hydroxide as a base and ammonium acetate as a cyclizing agent. This methodology is highly efficient and cost-effective for synthesis of symmetrical as well as unsymmetrical terpyridines. Importantly, these DEILs can be reused several times without an obvious loss of activity and are non-toxic, low-volatile, biodegradable and highly thermally stable. Therefore, these DEILs as a non-conventional reaction medium for the synthesis of terpyridines provides appealing opportunities to be investigated in the domain of green synthesis.

Keywords: terpyridine     deep eutectic solvent     ionic liquid     Kröhnke reaction     DABCO    

Generic user revocation systems for attribute-based encryption in cloud storage None

Genlang CHEN, Zhiqian XU, Hai JIANG, Kuan-ching LI

Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 11,   Pages 1362-1384 doi: 10.1631/FITEE.1800405

Abstract: providers and the shared multi-tenant environment present special challenges for data protection and accesscontrol.only protects data secrecy, but also has ciphertexts or decryption keys associated with fine-grained accessThis enforcement puts data access under control at each data item level.

Keywords: Attribute-based encryption     Generic user revocation     User privacy     Cloud storage     Access control    

Optimizing non-coalesced memory access for irregular applications with GPU computing

Ran Zheng, Yuan-dong Liu, Hai Jin,zhraner@hust.edu.cn,1531364016@qq.com,hjin@hust.edu.cn

Frontiers of Information Technology & Electronic Engineering 2020, Volume 21, Issue 9,   Pages 1267-1412 doi: 10.1631/FITEE.1900262

Abstract: However, irregular memory access exists in many applications, and the benefits of graphics processingIn recent years, several studies have presented some solutions to remove static irregular memory accessHowever, eliminating dynamic irregular memory access with software remains a serious challenge.without hardware extensions or offline profiling is proposed to eliminate dynamic irregular memory access, especially for indirect memory access.

based duplex radio-over-fiber link for millimeterwave signal transmission to a ring of multiple radio access None

Tayyab MEHMOOD, Hina QAYYUM, Salman GHAFOOR

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 2,   Pages 300-306 doi: 10.1631/FITEE.1700056

Abstract: architecture is proposed, where millimeter wave (mm-wave) signals are transmitted to four different radio access

Keywords: Radio over fiber     Millimeter wave     Radio access units    

The Research and Implementation of EAP - FAST Protocol in Public Wireless Local Area Network

Cao Ping,Pei Wenjiang

Strategic Study of CAE 2005, Volume 7, Issue 12,   Pages 78-82

Abstract: This friendly and easily deployable network access solution will be widely used in WLAN.

Keywords: public wireless local area network     port based network access control (802.1x)     flexible authentication    

Access Issues Spur Local Vaccine Efforts in Developing World

Chris Palmer

Engineering 2022, Volume 15, Issue 8,   Pages 3-5 doi: 10.1016/j.eng.2022.06.001

Implementation and performance evaluation of advance metering infrastructure for Borneo-Wide Power Grid

Mujahid TABASSUM,Manas K. HALDAR,Duaa Fatima S. KHAN

Frontiers in Energy 2020, Volume 14, Issue 1,   Pages 192-211 doi: 10.1007/s11708-016-0438-2

Abstract: The centralized supervisory control and data acquisition systems (SCADA) are replaced by a wide areanetwork used advanced metering infrastructure that operates on worldwide interoperability for microwave access

Keywords: renewable energy     multiprotocol label switching (MPLS)     power grid     phasor measurement unit (PMU)     supervisory controlacquisition systems (SCADA)     wide area monitoring system (WAMS)     worldwide interoperability for microwave access    

The Design on the Security Architecture of Public WLAN Based on Access Controller Mode

Song Yubo, Huai qun, Yang Xiaohui

Strategic Study of CAE 2008, Volume 10, Issue 8,   Pages 56-59

Abstract: A security model based on access controller is proposed in this paper.a compound 802.1x and WEB authentication scheme is provided to ensures cryptographically protected access

Keywords: public WLAN     security architecture     authentication     access controller    

Enhanced uplink non-orthogonalmultiple access for 5Gand beyond systems None

Wen-jia LIU, Xiao-lin HOU, Lan CHEN

Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 3,   Pages 340-356 doi: 10.1631/FITEE.1700842

Abstract: Uplink non-orthogonal multiple access (NOMA) is a promising technique to meet the requirements of theand high reliability in 5G, where unequal average received power is exploited as part of the multiple accesserror rate (BLER) target can be achieved compared with existing NOMA schemes and orthogonal multiple access

Keywords: Uplink non-orthogonal multiple access     Generalized Welch-bound equality     Multi-level received powers     Sequence    

Model division multiple access for semantic communications Research Article

Ping ZHANG, Xiaodong XU, Chen DONG, Kai NIU, Haotai LIANG, Zijian LIANG, Xiaoqi QIN, Mengying SUN, Hao CHEN, Nan MA, Wenjun XU, Guangyu WANG, Xiaofeng TAO,pzhang@bupt.edu.cn,xuxiaodong@bupt.edu.cn,dongchen@bupt.edu.cn,niukai@bupt.edu.cn

Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 6,   Pages 801-812 doi: 10.1631/FITEE.2300196

Abstract: In a multi-user system, system resources should be allocated to different users. In traditional communication systems, system resources generally include time, frequency, space, and power, so technologies such as time division (TDMA), frequency division (FDMA), space division (SDMA), code division (CDMA), and non-orthogonal (NOMA) are widely used. In , which is considered a new paradigm of the next-generation communication system, we extract high-dimensional features from signal sources in a model-based artificial intelligence approach from a semantic perspective and construct a model information space for signal sources and channel features. From the high-dimensional semantic space, we excavate the shared and personalized information of semantic information and propose a novel technology, named (MDMA)%29&ck%5B%5D=abstract&ck%5B%5D=keyword'>, which is based on the resource of the semantic domain. From the perspective of information theory, we prove that MDMA can attain more performance gains than traditional technologies. Simulation results show that MDMA saves more bandwidth resources than traditional technologies, and that MDMA has at least a 5-dB advantage over NOMA in the additive white Gaussian noise (AWGN) channel under the low signal-to-noise (SNR) condition.

Keywords: Model division multiple access (MDMA)     Semantic communication     Multiple access    

Title Author Date Type Operation

Aslotted floor acquisitionmultiple access based MACprotocol for underwater acoustic networks withRTS

Liang-fang QIAN,Sen-lin ZHANG,Mei-qin LIU

Journal Article

Double access control model of web service based ondistributed simulation system

Chen Xueqin,Wu Huizhong,Zhu Yaoqin

Journal Article

Node Status Monitoring of Information-Centric Internet of Things

Cui Liqun, Wu Jun

Journal Article

Easy access to pharmaceutically relevant heterocycles by catalytic reactions involving

Ximei Zhao, Matthias Rudolph, Abdullah M. Asiri, A. Stephen K. Hashmi

Journal Article

Multiple-antenna techniques in nonorthogonalmultiple access: a review

Fei-yan TIAN, Xiao-ming CHEN

Journal Article

ionic liquids based on DABCO-derived quaternary ammonium salts: A promising reaction medium in gaining access

Muhammad Faisal, Azeem Haider, Quret ul Aein, Aamer Saeed, Fayaz Ali Larik

Journal Article

Generic user revocation systems for attribute-based encryption in cloud storage

Genlang CHEN, Zhiqian XU, Hai JIANG, Kuan-ching LI

Journal Article

Optimizing non-coalesced memory access for irregular applications with GPU computing

Ran Zheng, Yuan-dong Liu, Hai Jin,zhraner@hust.edu.cn,1531364016@qq.com,hjin@hust.edu.cn

Journal Article

based duplex radio-over-fiber link for millimeterwave signal transmission to a ring of multiple radio access

Tayyab MEHMOOD, Hina QAYYUM, Salman GHAFOOR

Journal Article

The Research and Implementation of EAP - FAST Protocol in Public Wireless Local Area Network

Cao Ping,Pei Wenjiang

Journal Article

Access Issues Spur Local Vaccine Efforts in Developing World

Chris Palmer

Journal Article

Implementation and performance evaluation of advance metering infrastructure for Borneo-Wide Power Grid

Mujahid TABASSUM,Manas K. HALDAR,Duaa Fatima S. KHAN

Journal Article

The Design on the Security Architecture of Public WLAN Based on Access Controller Mode

Song Yubo, Huai qun, Yang Xiaohui

Journal Article

Enhanced uplink non-orthogonalmultiple access for 5Gand beyond systems

Wen-jia LIU, Xiao-lin HOU, Lan CHEN

Journal Article

Model division multiple access for semantic communications

Ping ZHANG, Xiaodong XU, Chen DONG, Kai NIU, Haotai LIANG, Zijian LIANG, Xiaoqi QIN, Mengying SUN, Hao CHEN, Nan MA, Wenjun XU, Guangyu WANG, Xiaofeng TAO,pzhang@bupt.edu.cn,xuxiaodong@bupt.edu.cn,dongchen@bupt.edu.cn,niukai@bupt.edu.cn

Journal Article